DNS Evolution
Geoff Huston AM
APNIC Labs
https://xkcd.com/1361/
Why pick on the DNS?
The DNS is used by everyone and everything
• Because pretty much everything you do on the net starts with a call to
the DNS
• If we could see your stream of DNS queries in real time we could easily
assemble a detailed profile of you and your interests and activities -
as it happens!
Why pick on the DNS?
The DNS is very easy to tap and tamper
• DNS queries are open and unencrypted
• DNS payloads are not secured and tampering cannot be readily detected
• DNS responses are predictable and false answers can be injected
Why pick on the DNS?
The DNS is hard for users to trace
• Noone knows exactly where their queries go
• Noone can know precisely where their answers come from
What are we doing
about this?
I’d like to look at this question by grouping our
responses into three areas of activity:
1. Adding authenticity to the DNS
2. Increasing the reliance on the DNS for application level
rendezvous functions
3. Plugging DNS information leaks
1. Adding authenticity to the DNS
2. Increasing the reliance on the DNS for application
level rendezvous functions
3. Plugging DNS information leaks
How can you trust the DNS
answer?
• Send your query to the “right” IP address and you will get the “right
answer!
Or
• Request a digital signature along with the DNS answer and validate
the answer using a pre-provisioned trusted key (DNSSEC)
8
Is DNSSEC being used?
• Yes and No!
9
Is DNSSEC being used?
• Yes and No!
10
Who validates DNS responses?
Is DNSSEC being used?
• Yes and No!
11
2014 2016 2018 2020
Who validates DNS responses?
25% of users are behind
DNSSEC-validating resolvers
who will not resolve a badly
signed DNS name
Is DNSSEC being used?
• Yes and No!
12
Who signs DNS Zones?
Public data on the DNSSEC zone signing rate
is hard to define, and even harder to come by!
?
Problems with DNSSEC
13
• Large DNS responses cause robustness issues for DNS
• Getting large responses through the network has reliability issues with UDP
packet fragmentation and timing issues with signalled cut-over to TCP
• The validator has to perform a full backtrace query sequence to assemble the
full DNSSEC signature chain
• So the problem is that DNSSEC validation may entail a sequence of queries
where each of the responses may require encounter UDP fragmentation
packet loss
Some More Problems with DNSSEC
14
• Cryptographically “stronger” keys tend to be bigger keys over time, so
the issue of cramming more data into DNS transactions is not going
away!
• The stub-to-recursive hop is generally not using validation, so the user
ends up trusting the validating recursive resolver in any case
• The current DNSSEC framework represents a lot of effort for only a
marginal gain
Are we getting better at
DNSSEC?
There is still a lot of room to improve our DNSSEC story
• Reducing validation-chain query delays using DNSSEC Chain
responses?
• Using “denser” crypto algorithms to limit key and signature sizes?
• Using TCP for DNSSEC queries?
• NSEC3? Really?
• NSEC5? YMBK!
15
Authenticity in the DNS
• DNSSEC Validation cannot not prevent DNS eavesdropping,
interception or tampering – all it can do is withhold DNS responses
that are not “genuine”
• DNSSEC adoption is a trade-off in terms of additional costs of added
points of fragility, added delay and load points balanced against the
increased assurance of being able to place trust that the DNS
responses are authentic
16
1. Adding authenticity to the DNS
2. Increasing the reliance on the DNS for application
level rendezvous functions
3. Plugging DNS information leaks
It used to be so simple
• Query the DNS with a service name
• Get a response with the IP host address where the service is located
• Use the application to negotiate a service with the addressed host
• All services that share a common name share a common host
18
But we wanted more:
• We wanted to make a distinction between the service name and the
platform that hosted the service
• We wanted to have different services accessible using the same service name
• We wanted a collection of platforms to deliver the service associated with a
single service name
• We wanted to outsource different services to different service providers
• We wanted to steer the user to the “right” service provider for each user
• And we wanted it to be FAST!
• The concept of “go anywhere first and get redirected to an optimal service
delivery point” is considered to be not FAST
19
So we added Bells and Whistles
• Put all of this optimisation into the DNS by:
• Mapping the service names to host names
• CNAME, DNAME and ANAME
• None of these are very satisfactory!
• The SRV record
• This is either a swiss army knife or a chain saw massacre!
• Add the service name (port) and protocol (transport) to the service name and use this as
the query
• And get the DNS response to come back with a collection of service delivery points
• The Client Subnet query extension
• Tag the query with the querier to permit tailoring of the service response in the DNS
rather than in the application
20
More Bells (and Whistles!)
• SVCB and HTTPSSVC Resource Records
• The “mega” response that can provide Application Level Protocols, IPv4 and
IPv6 addresses, ESNI key, priority
• Oh, and yes, there is an “alias form” that allows alias mapping at a zone apex
21
It’s faster, but…
• But as we add more instrumentation to the DNS, it becomes a generic
rendezvous tool, where a client forms a query based on an intended
service access and the DNS response provides a set of service
connection parameters that is potentially tailored to optimise the
delivered service
• This means that real time knowledge of a user’s DNS queries is
synonymous to knowledge of a user’s immediate intentions
• Which means that the DNS privacy issues become even more critical
22
1. Adding authenticity to the DNS
2. Increasing the reliance on the DNS for application
level rendezvous functions
3. Plugging DNS information leaks
Plugging the DNS leakage
• Query Name Minimisation to reduce the extravagant chattiness of
the DNS resolution process on the recursive to authoritative path
• DNS over TLS on the stub to recursive path
• Channel protection, remote end authentication and transport robustness
• DNS over HTTPS (/3) on the stub to recursive path
• Channel protection, remote end authentication, transport robustness and
HTTP object semantics
• Oblivious DNS over HTTPS (/3) on the stub to recursive path
• Hide the implicit end point identity / query name association leakage
24
Coming soon?
• Extending DNS channel protection to the recursive to authoritative
hops
(Although this may be tougher than it looks at first!)
25
Scaling with Encrypted Channels
• Session level encryption involves session establishment and
maintenance overhead
• Typically this entails a TCP overhead (direction or within a QUIC envelope) and
a TGLS overhead
• This can be amortised through session reuse
• Session reuse is most effective on the stub to recursive paths
• The secure Web infrastructure points to ways that we can scale an
encrypted DNS infrastructure, but the economics of the DNS are
somewhat different than those of the web
26
Will all this be deployed?
27
Can we do this?
• Pretty clearly we have most of the tools available to achieve all of
these objectives
• Leverage TLS to provide session level encryption
• Leverage HTTPS to push stub resolution functions into applications
• Use the DNS HTTPSSVC to provide the ESNI key
• Yes we can!
28
Will we do this?
• This is a far more challenging question!
29
If HTTPS worked, why not DoH?
• Any change to the DNS that requires user configuration, or a change
of CPE behaviour will not be easy to gather deployment momentum
• There is no untapped financial return in DNS resolution, so this is not
an activity that has strong commercial impetus
• Many public environments use DNS oversight and alteration as a
means of content moderation. There is little appetite to make that
harder
• Browser vendors have far more limited leverage in the DNS, as
compared to content delivery over HTTP
The DNS Economy
• In the public Internet, end clients don’t normally pay directly for DNS
recursive resolution services
• Which implies that outside of the domain of the local ISP, DNS
resolvers are essentially unfunded by the resolver’s clients
• And efforts to monetise the DNS with various forms of funded
misdirection (such as NXDOMAIN substitution) are generally viewed
with extreme disfavour
• Open Resolver efforts run the risk of success-disaster
• The more they are used, the greater the funding problem to run them at scale
• The greater the funding problem the greater the temptation to monetise the
DNS resolver function in more subtle ways
The DNS Economy
• The default option is that the ISP funds and operate the recursive DNS
service, funded by the ISP’s client base
• 70% of all end clients use same-AS recursive resolvers *
• However the fact that it works today does not mean that you can
double the input costs and expect it to just keep on working
tomorrow
• For ISPs the DNS is a cost department, not a revenue source
• We should expect strong resistance from ISPs to increase their costs in DNS
service provision
• The DNS is also highly resistant to changes in the edge infrastructure
32
* https://stats.labs.apnic.net/rvrs
Where is this heading?
• Will any of these privacy approaches becomes mainstream in the
public Internet?
My Opinion
• ISP-based provisioning of DNS servers without channel encryption will
continue to be the mainstream of the public DNS infrastructure
• Most users don’t change their platform settings from the defaults and
CPE based service provisioning in the wired networks and direct
provisioning in mobile networks will persist
My Opinion
• ISP-based provisioning of DNS servers without channel encryption will
continue to be the mainstream of the public DNS infrastructure
• Most users don’t change their platform settings from the defaults and
CPE based service provisioning in the wired networks and direct
provisioning in mobile networks will persist
• But that’s not the full story...
“Split” DNS
• Is appears more likely that applications who want to tailor their DNS
use to adopt a more private profile will hive off to use DoH to an
application-selected DNS service, while the platform itself will
continue to use libraries that will default to DNS over UDP to the ISP-
provided recursive DNS resolver
• That way the application ecosystem can fund its own DNS privacy
infrastructure and avoid waiting for everyone else to make the
necessary infrastructure and service investments before they can
adopt DNS privacy themselves
• The prospect of application-specific naming services is a very real
prospect in such a scenario
It’s life Jim, but not as we
know it!*
• The overall progression here is an evolution from network-centric
services to platform-centric services to today’s world of application-
centric services
• It’s clear that the DNS is being swept up in this shift, and the DNS is
changing in almost every respect
• The future prospects of a single unified coherent name space as
embodied in the DNS, as we currently know it, for the entire internet
service domain are looking pretty poor right now!
* With apologies to the Trekies!
Thanks!

More Related Content

PDF
RIPE 82: DNS Evolution
PDF
RIPE 82: An Update on Fragmentation Loss Rates in IPv6
PDF
RIPE 82: Measuring Recursive Resolver Centrality
PDF
ICANN DNS Symposium 2021: Measuring Recursive Resolver Centrality
PDF
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
PDF
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
PDF
Thoughts about DNS for DDoS
PPTX
bdNOG 7 - Re-engineering the DNS - one resolver at a time
RIPE 82: DNS Evolution
RIPE 82: An Update on Fragmentation Loss Rates in IPv6
RIPE 82: Measuring Recursive Resolver Centrality
ICANN DNS Symposium 2021: Measuring Recursive Resolver Centrality
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
Thoughts about DNS for DDoS
bdNOG 7 - Re-engineering the DNS - one resolver at a time

What's hot (20)

PDF
DNS-OARC 34: Measuring DNS Flag Day 2020
PDF
Experience Using RIR Whois
PDF
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
PDF
RIPE 78: IPv6 reliability measurements
PDF
VNIX-NOG 2021: IPv6 Deployment Update
PPTX
IPv6 and the DNS, RIPE 73
PDF
Rolling the Root Zone DNSSEC Key Signing Key
PDF
BSides: BGP Hijacking and Secure Internet Routing
PDF
Zombie DNS
PDF
Measuring the End User
PDF
NANOG 74: That KSK Roll
PDF
How Greta uses NATS to revolutionize data distribution on the Internet
ZIP
DNS Cache Poisoning
PDF
Network
PDF
IETF 112: Internet centrality and its impact on routing
PPTX
What to consider when monitoring microservices
PDF
The curse of the open recursor
PPTX
Intel aspera-medical-v1
DOCX
Build your own cloud server
PDF
DYNAMIC HOST CONFIGURATION PROTOCOL
DNS-OARC 34: Measuring DNS Flag Day 2020
Experience Using RIR Whois
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
RIPE 78: IPv6 reliability measurements
VNIX-NOG 2021: IPv6 Deployment Update
IPv6 and the DNS, RIPE 73
Rolling the Root Zone DNSSEC Key Signing Key
BSides: BGP Hijacking and Secure Internet Routing
Zombie DNS
Measuring the End User
NANOG 74: That KSK Roll
How Greta uses NATS to revolutionize data distribution on the Internet
DNS Cache Poisoning
Network
IETF 112: Internet centrality and its impact on routing
What to consider when monitoring microservices
The curse of the open recursor
Intel aspera-medical-v1
Build your own cloud server
DYNAMIC HOST CONFIGURATION PROTOCOL
Ad

Similar to NANOG 82: DNS Evolution (20)

PDF
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
PDF
RIPE 86: DNSSEC — Yes or No?
PDF
Introduction DNSSec
PDF
DNS Openness
PDF
Some DNSSEC Measurements, presented at ICANN 82
PDF
NZNOG 2020: DOH
PPTX
dnssec_networking_improvement_for_security.pptx
PDF
NZNOG 2013 - Experiments in DNSSEC
PPTX
IGF 2023: DNS Privacy
PDF
What if everyone did it?, by Geoff Huston [APNIC 38 / APOPS 1]
PDF
DNS Security
PDF
Technical and Business Considerations for DNSSEC Deployment
PDF
NANOG 84: DNS Openness
PDF
DNS-OARC 38: The resolvers we use
PPTX
PDF
Rolling the Root KSK
PDF
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
PPTX
Domain Name System and Dynamic Host Configuration Protocol.pptx
PDF
Measuring the centralization of DNS resolution' presentation by Geoff Huston...
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
RIPE 86: DNSSEC — Yes or No?
Introduction DNSSec
DNS Openness
Some DNSSEC Measurements, presented at ICANN 82
NZNOG 2020: DOH
dnssec_networking_improvement_for_security.pptx
NZNOG 2013 - Experiments in DNSSEC
IGF 2023: DNS Privacy
What if everyone did it?, by Geoff Huston [APNIC 38 / APOPS 1]
DNS Security
Technical and Business Considerations for DNSSEC Deployment
NANOG 84: DNS Openness
DNS-OARC 38: The resolvers we use
Rolling the Root KSK
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
Domain Name System and Dynamic Host Configuration Protocol.pptx
Measuring the centralization of DNS resolution' presentation by Geoff Huston...
Ad

More from APNIC (20)

PPTX
APNIC Report, presented at APAN 60 by Thy Boskovic
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
DNSSEC Made Easy, presented at PHNOG 2025
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
PDF
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
PDF
IPv6 Deployment and Best Practices, presented by Makito Lay
PDF
Cleaning up your RPKI invalids, presented at PacNOG 35
PDF
The Internet - By the numbers, presented at npNOG 11
PDF
Transmission Control Protocol (TCP) and Starlink
PDF
DDoS in India, presented at INNOG 8 by Dave Phelan
PDF
Global Networking Trends, presented at the India ISP Conclave 2025
PDF
Make DDoS expensive for the threat actors
PDF
Fast Reroute in SR-MPLS, presented at bdNOG 19
PDF
DDos Mitigation Strategie, presented at bdNOG 19
PDF
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
PDF
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
PDF
Measuring Starlink Protocol Performance, presented at LACNIC 43
APNIC Report, presented at APAN 60 by Thy Boskovic
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
RPKI Status Update, presented by Makito Lay at IDNOG 10
The Internet -By the Numbers, Sri Lanka Edition
Triggering QUIC, presented by Geoff Huston at IETF 123
DNSSEC Made Easy, presented at PHNOG 2025
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
IPv6 Deployment and Best Practices, presented by Makito Lay
Cleaning up your RPKI invalids, presented at PacNOG 35
The Internet - By the numbers, presented at npNOG 11
Transmission Control Protocol (TCP) and Starlink
DDoS in India, presented at INNOG 8 by Dave Phelan
Global Networking Trends, presented at the India ISP Conclave 2025
Make DDoS expensive for the threat actors
Fast Reroute in SR-MPLS, presented at bdNOG 19
DDos Mitigation Strategie, presented at bdNOG 19
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
Measuring Starlink Protocol Performance, presented at LACNIC 43

Recently uploaded (20)

PPTX
Cyber Hygine IN organizations in MSME or
PPTX
10.2981-wlb.2004.021Figurewlb3bf00068fig0001.pptx
PPTX
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
PPTX
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
PDF
Paper The World Game (s) Great Redesign.pdf
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PPTX
Basic understanding of cloud computing one need
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPSX
AI AppSec Threats and Defenses 20250822.ppsx
PDF
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
PDF
Slides: PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PPT
12 Things That Make People Trust a Website Instantly
Cyber Hygine IN organizations in MSME or
10.2981-wlb.2004.021Figurewlb3bf00068fig0001.pptx
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
Paper The World Game (s) Great Redesign.pdf
Alethe Consulting Corporate Profile and Solution Aproach
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
AI_Cyberattack_Solutions AI AI AI AI .pptx
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Basic understanding of cloud computing one need
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
AI AppSec Threats and Defenses 20250822.ppsx
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
Slides: PDF The World Game (s) Eco Economic Epochs.pdf
Uptota Investor Deck - Where Africa Meets Blockchain
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
12 Things That Make People Trust a Website Instantly

NANOG 82: DNS Evolution

  • 3. Why pick on the DNS? The DNS is used by everyone and everything • Because pretty much everything you do on the net starts with a call to the DNS • If we could see your stream of DNS queries in real time we could easily assemble a detailed profile of you and your interests and activities - as it happens!
  • 4. Why pick on the DNS? The DNS is very easy to tap and tamper • DNS queries are open and unencrypted • DNS payloads are not secured and tampering cannot be readily detected • DNS responses are predictable and false answers can be injected
  • 5. Why pick on the DNS? The DNS is hard for users to trace • Noone knows exactly where their queries go • Noone can know precisely where their answers come from
  • 6. What are we doing about this? I’d like to look at this question by grouping our responses into three areas of activity: 1. Adding authenticity to the DNS 2. Increasing the reliance on the DNS for application level rendezvous functions 3. Plugging DNS information leaks
  • 7. 1. Adding authenticity to the DNS 2. Increasing the reliance on the DNS for application level rendezvous functions 3. Plugging DNS information leaks
  • 8. How can you trust the DNS answer? • Send your query to the “right” IP address and you will get the “right answer! Or • Request a digital signature along with the DNS answer and validate the answer using a pre-provisioned trusted key (DNSSEC) 8
  • 9. Is DNSSEC being used? • Yes and No! 9
  • 10. Is DNSSEC being used? • Yes and No! 10 Who validates DNS responses?
  • 11. Is DNSSEC being used? • Yes and No! 11 2014 2016 2018 2020 Who validates DNS responses? 25% of users are behind DNSSEC-validating resolvers who will not resolve a badly signed DNS name
  • 12. Is DNSSEC being used? • Yes and No! 12 Who signs DNS Zones? Public data on the DNSSEC zone signing rate is hard to define, and even harder to come by! ?
  • 13. Problems with DNSSEC 13 • Large DNS responses cause robustness issues for DNS • Getting large responses through the network has reliability issues with UDP packet fragmentation and timing issues with signalled cut-over to TCP • The validator has to perform a full backtrace query sequence to assemble the full DNSSEC signature chain • So the problem is that DNSSEC validation may entail a sequence of queries where each of the responses may require encounter UDP fragmentation packet loss
  • 14. Some More Problems with DNSSEC 14 • Cryptographically “stronger” keys tend to be bigger keys over time, so the issue of cramming more data into DNS transactions is not going away! • The stub-to-recursive hop is generally not using validation, so the user ends up trusting the validating recursive resolver in any case • The current DNSSEC framework represents a lot of effort for only a marginal gain
  • 15. Are we getting better at DNSSEC? There is still a lot of room to improve our DNSSEC story • Reducing validation-chain query delays using DNSSEC Chain responses? • Using “denser” crypto algorithms to limit key and signature sizes? • Using TCP for DNSSEC queries? • NSEC3? Really? • NSEC5? YMBK! 15
  • 16. Authenticity in the DNS • DNSSEC Validation cannot not prevent DNS eavesdropping, interception or tampering – all it can do is withhold DNS responses that are not “genuine” • DNSSEC adoption is a trade-off in terms of additional costs of added points of fragility, added delay and load points balanced against the increased assurance of being able to place trust that the DNS responses are authentic 16
  • 17. 1. Adding authenticity to the DNS 2. Increasing the reliance on the DNS for application level rendezvous functions 3. Plugging DNS information leaks
  • 18. It used to be so simple • Query the DNS with a service name • Get a response with the IP host address where the service is located • Use the application to negotiate a service with the addressed host • All services that share a common name share a common host 18
  • 19. But we wanted more: • We wanted to make a distinction between the service name and the platform that hosted the service • We wanted to have different services accessible using the same service name • We wanted a collection of platforms to deliver the service associated with a single service name • We wanted to outsource different services to different service providers • We wanted to steer the user to the “right” service provider for each user • And we wanted it to be FAST! • The concept of “go anywhere first and get redirected to an optimal service delivery point” is considered to be not FAST 19
  • 20. So we added Bells and Whistles • Put all of this optimisation into the DNS by: • Mapping the service names to host names • CNAME, DNAME and ANAME • None of these are very satisfactory! • The SRV record • This is either a swiss army knife or a chain saw massacre! • Add the service name (port) and protocol (transport) to the service name and use this as the query • And get the DNS response to come back with a collection of service delivery points • The Client Subnet query extension • Tag the query with the querier to permit tailoring of the service response in the DNS rather than in the application 20
  • 21. More Bells (and Whistles!) • SVCB and HTTPSSVC Resource Records • The “mega” response that can provide Application Level Protocols, IPv4 and IPv6 addresses, ESNI key, priority • Oh, and yes, there is an “alias form” that allows alias mapping at a zone apex 21
  • 22. It’s faster, but… • But as we add more instrumentation to the DNS, it becomes a generic rendezvous tool, where a client forms a query based on an intended service access and the DNS response provides a set of service connection parameters that is potentially tailored to optimise the delivered service • This means that real time knowledge of a user’s DNS queries is synonymous to knowledge of a user’s immediate intentions • Which means that the DNS privacy issues become even more critical 22
  • 23. 1. Adding authenticity to the DNS 2. Increasing the reliance on the DNS for application level rendezvous functions 3. Plugging DNS information leaks
  • 24. Plugging the DNS leakage • Query Name Minimisation to reduce the extravagant chattiness of the DNS resolution process on the recursive to authoritative path • DNS over TLS on the stub to recursive path • Channel protection, remote end authentication and transport robustness • DNS over HTTPS (/3) on the stub to recursive path • Channel protection, remote end authentication, transport robustness and HTTP object semantics • Oblivious DNS over HTTPS (/3) on the stub to recursive path • Hide the implicit end point identity / query name association leakage 24
  • 25. Coming soon? • Extending DNS channel protection to the recursive to authoritative hops (Although this may be tougher than it looks at first!) 25
  • 26. Scaling with Encrypted Channels • Session level encryption involves session establishment and maintenance overhead • Typically this entails a TCP overhead (direction or within a QUIC envelope) and a TGLS overhead • This can be amortised through session reuse • Session reuse is most effective on the stub to recursive paths • The secure Web infrastructure points to ways that we can scale an encrypted DNS infrastructure, but the economics of the DNS are somewhat different than those of the web 26
  • 27. Will all this be deployed? 27
  • 28. Can we do this? • Pretty clearly we have most of the tools available to achieve all of these objectives • Leverage TLS to provide session level encryption • Leverage HTTPS to push stub resolution functions into applications • Use the DNS HTTPSSVC to provide the ESNI key • Yes we can! 28
  • 29. Will we do this? • This is a far more challenging question! 29
  • 30. If HTTPS worked, why not DoH? • Any change to the DNS that requires user configuration, or a change of CPE behaviour will not be easy to gather deployment momentum • There is no untapped financial return in DNS resolution, so this is not an activity that has strong commercial impetus • Many public environments use DNS oversight and alteration as a means of content moderation. There is little appetite to make that harder • Browser vendors have far more limited leverage in the DNS, as compared to content delivery over HTTP
  • 31. The DNS Economy • In the public Internet, end clients don’t normally pay directly for DNS recursive resolution services • Which implies that outside of the domain of the local ISP, DNS resolvers are essentially unfunded by the resolver’s clients • And efforts to monetise the DNS with various forms of funded misdirection (such as NXDOMAIN substitution) are generally viewed with extreme disfavour • Open Resolver efforts run the risk of success-disaster • The more they are used, the greater the funding problem to run them at scale • The greater the funding problem the greater the temptation to monetise the DNS resolver function in more subtle ways
  • 32. The DNS Economy • The default option is that the ISP funds and operate the recursive DNS service, funded by the ISP’s client base • 70% of all end clients use same-AS recursive resolvers * • However the fact that it works today does not mean that you can double the input costs and expect it to just keep on working tomorrow • For ISPs the DNS is a cost department, not a revenue source • We should expect strong resistance from ISPs to increase their costs in DNS service provision • The DNS is also highly resistant to changes in the edge infrastructure 32 * https://stats.labs.apnic.net/rvrs
  • 33. Where is this heading? • Will any of these privacy approaches becomes mainstream in the public Internet?
  • 34. My Opinion • ISP-based provisioning of DNS servers without channel encryption will continue to be the mainstream of the public DNS infrastructure • Most users don’t change their platform settings from the defaults and CPE based service provisioning in the wired networks and direct provisioning in mobile networks will persist
  • 35. My Opinion • ISP-based provisioning of DNS servers without channel encryption will continue to be the mainstream of the public DNS infrastructure • Most users don’t change their platform settings from the defaults and CPE based service provisioning in the wired networks and direct provisioning in mobile networks will persist • But that’s not the full story...
  • 36. “Split” DNS • Is appears more likely that applications who want to tailor their DNS use to adopt a more private profile will hive off to use DoH to an application-selected DNS service, while the platform itself will continue to use libraries that will default to DNS over UDP to the ISP- provided recursive DNS resolver • That way the application ecosystem can fund its own DNS privacy infrastructure and avoid waiting for everyone else to make the necessary infrastructure and service investments before they can adopt DNS privacy themselves • The prospect of application-specific naming services is a very real prospect in such a scenario
  • 37. It’s life Jim, but not as we know it!* • The overall progression here is an evolution from network-centric services to platform-centric services to today’s world of application- centric services • It’s clear that the DNS is being swept up in this shift, and the DNS is changing in almost every respect • The future prospects of a single unified coherent name space as embodied in the DNS, as we currently know it, for the entire internet service domain are looking pretty poor right now! * With apologies to the Trekies!